Quantcast
Channel: Comments on: The Danger To Privacy Isn't Corporate Data-Mining Or Governmental Surveillance – It's Both Combined
Browsing all 37 articles
Browse latest View live

By: printersMate

The problem with any cryptography system is dealing with the key exchange required to enable the use of encryption. The use of CAs is a reasonable approach to deal with communication between strangers...

View Article



By: Ano Nymous

Actually, the MSM is going to shut up completely about the Pirate Party, just like they always do. We got one “one-question party” (i don’t know what that kind of party is really called in English, but...

View Article

By: Ano Nymous

Well, this is approximately what I’ve been trying to tell people for the last three years, but i think youre wrong about who we trust on the different sides of the “pond”. In Sweden, i have only read...

View Article

By: printersMate

If one of the multiple CAs is compromised then their signing certificate is revoked, but opther signing certificates remain valid.. With a single CA, when they are compromised then the whole system is...

View Article

By: Ano Nymous

Also, Clean IT Project. A law that is being secretly negotiated that is supposed to force companies into monitoring and censoring different types of online content by users. MSM doesn’t say a word....

View Article


By: Anonymous

Communication security is a fundamental enabling technology for privacy, although I agree that they’re not the same thing. All authentication systems eventually collapse to an axiomatic trust decision...

View Article

By: printersMate

Privacy is controlling the spread of information, and depends on trusting the people to whom you give the information. Communications security can only protect data in transit. File encryption can...

View Article

By: Björn Persson

Wrong. If you have compromised one CA, then you can issue a seemingly valid certificate for whichever domain name you want. Then you can redirect your victims’ requests to your own malicious website,...

View Article


By: Corruption

What about companies and government sharing your data including location and login information? In some country, somewhere, your info will be for sale… If I remember correct, telephone companies share...

View Article


By: Ano Nymous

The wrong kind of information IS dangerous. I said it. Dangerous. Dangerous. Dangerous. Because if certain information and certain humans together is dangerous and you want to get rid of the danger,...

View Article

By: A swede

Decentralized P2P crypto-networks of public key certificates? 1. If X % of my “friends” say something, then I believe them. 2. Small world phenomenon.

View Article

By: Esduardo Partarroyo

Why do you publicite this so late? why in 2015 when nothing can be done with this information. Even me realized this years ago, but who would believe me? Is it a coincidence this new whas published in...

View Article

By: Ano Nymous

Well, this is approximately what I’ve been trying to tell people for the last three years, but i think youre wrong about who we trust on the different sides of the “pond”. In Sweden, i have only read...

View Article


By: printersMate

If one of the multiple CAs is compromised then their signing certificate is revoked, but opther signing certificates remain valid.. With a single CA, when they are compromised then the whole system is...

View Article

By: Ano Nymous

Also, Clean IT Project. A law that is being secretly negotiated that is supposed to force companies into monitoring and censoring different types of online content by users. MSM doesn’t say a word....

View Article


Image may be NSFW.
Clik here to view.

By: Anonymous

Communication security is a fundamental enabling technology for privacy, although I agree that they’re not the same thing. All authentication systems eventually collapse to an axiomatic trust decision...

View Article

By: printersMate

Privacy is controlling the spread of information, and depends on trusting the people to whom you give the information. Communications security can only protect data in transit. File encryption can...

View Article


By: Björn Persson

Wrong. If you have compromised one CA, then you can issue a seemingly valid certificate for whichever domain name you want. Then you can redirect your victims’ requests to your own malicious website,...

View Article

By: Corruption

What about companies and government sharing your data including location and login information? In some country, somewhere, your info will be for sale… If I remember correct, telephone companies share...

View Article

By: Ano Nymous

The wrong kind of information IS dangerous. I said it. Dangerous. Dangerous. Dangerous. Because if certain information and certain humans together is dangerous and you want to get rid of the danger,...

View Article
Browsing all 37 articles
Browse latest View live




Latest Images